WO2009028982A1 - Dispositif de transmission et de protection intégrée d'informations - Google Patents
Dispositif de transmission et de protection intégrée d'informations Download PDFInfo
- Publication number
- WO2009028982A1 WO2009028982A1 PCT/RU2007/000580 RU2007000580W WO2009028982A1 WO 2009028982 A1 WO2009028982 A1 WO 2009028982A1 RU 2007000580 W RU2007000580 W RU 2007000580W WO 2009028982 A1 WO2009028982 A1 WO 2009028982A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- code
- information
- characters
- ary
- integrity
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 100
- 230000005540 biological transmission Effects 0.000 title claims abstract description 55
- 238000004891 communication Methods 0.000 claims abstract description 44
- 238000012795 verification Methods 0.000 claims description 17
- 230000004807 localization Effects 0.000 claims description 15
- 230000001066 destructive effect Effects 0.000 claims description 13
- 238000003860 storage Methods 0.000 claims description 10
- 238000012546 transfer Methods 0.000 claims description 10
- 238000012545 processing Methods 0.000 claims description 9
- 230000007423 decrease Effects 0.000 claims description 8
- 230000008569 process Effects 0.000 claims description 8
- 239000011159 matrix material Substances 0.000 claims description 7
- 238000004458 analytical method Methods 0.000 claims description 6
- 230000008859 change Effects 0.000 claims description 6
- 238000001914 filtration Methods 0.000 claims description 4
- 230000014759 maintenance of location Effects 0.000 claims description 4
- 230000007704 transition Effects 0.000 claims description 4
- 239000013598 vector Substances 0.000 claims description 4
- 230000004069 differentiation Effects 0.000 claims description 2
- 238000006467 substitution reaction Methods 0.000 claims description 2
- 230000001360 synchronised effect Effects 0.000 claims description 2
- 230000003044 adaptive effect Effects 0.000 claims 1
- 238000005065 mining Methods 0.000 abstract 1
- 238000007670 refining Methods 0.000 abstract 1
- 238000012937 correction Methods 0.000 description 16
- 238000006243 chemical reaction Methods 0.000 description 11
- 230000010365 information processing Effects 0.000 description 10
- 230000009466 transformation Effects 0.000 description 10
- 230000006978 adaptation Effects 0.000 description 8
- 230000036039 immunity Effects 0.000 description 8
- 238000012544 monitoring process Methods 0.000 description 7
- 125000004122 cyclic group Chemical group 0.000 description 6
- 238000013461 design Methods 0.000 description 6
- 238000001514 detection method Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 6
- 238000009826 distribution Methods 0.000 description 4
- 238000011084 recovery Methods 0.000 description 4
- 238000004364 calculation method Methods 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000009365 direct transmission Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000013101 initial test Methods 0.000 description 1
- 238000012886 linear function Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000000452 restraining effect Effects 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
- 238000012956 testing procedure Methods 0.000 description 1
- 238000000844 transformation Methods 0.000 description 1
- 230000001131 transforming effect Effects 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M13/00—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
- H03M13/35—Unequal or adaptive error protection, e.g. by providing a different level of protection according to significance of source information or by adapting the coding according to the change of transmission channel characteristics
- H03M13/353—Adaptation to the channel
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M13/00—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
- H03M13/03—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
- H03M13/05—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M13/00—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
- H03M13/03—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
- H03M13/05—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits
- H03M13/13—Linear codes
- H03M13/134—Non-binary linear block codes not provided for otherwise
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/0001—Systems modifying transmission characteristics according to link quality, e.g. power backoff
- H04L1/0009—Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the channel coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0045—Arrangements at the receiver end
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0056—Systems characterized by the type of code used
- H04L1/0057—Block codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/08—Arrangements for detecting or preventing errors in the information received by repeating transmission, e.g. Verdan system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0056—Systems characterized by the type of code used
- H04L1/0071—Use of interleaving
Definitions
- the invention relates to technical means of noise-resistant transmission over communication channels and networks and comprehensive protection of information from all possible types of impacts on information during its transmission and storage and can be used in various types of information systems, networks and communication channels.
- Known [2,3] are methods of encrypting information based on the use of cryptographic information conversion, and methods for comprehensive information protection using cryptographic conversion and noise-resistant coding, and the method combines several separate protection procedures based on various methods of information processing, for example, noise-resistant cyclic code with error detection, cryptographic conversion of information, an insert for checking the integrity of information, etc.
- the disadvantages of such methods are:
- ⁇ increases the redundancy introduced for the comprehensive protection of information; ⁇ complicates the processing and reduces the speed of information exchange;
- Examples include the NEE 802.16 standard (WiMax) and the European standard EN 300 (DVB).
- WiMax WiMax
- DVD European standard
- different methods algorithms, programs, devices
- the aim of the invention is the universalization of the task of transmitting and comprehensive protection of information within one set of operations of the method, expanding the transmission capabilities through any communication channels and providing guaranteed parameters (probability-time characteristics of the exchange), as well as ensuring the creation of universal equipment for a wide range of types and quality of communication channels capable of adjusting to the conditions of use and the possibilities achieved.
- the proposed method allows you to perform all of the above information protection functions with higher efficiency within a single set of information processing operations with a single introduction of redundancy.
- stochastic (n, k, q, m) codes are used, where p, k are the parameters of the source binary code, q is the code base, m is the number of repetitions of the code block with the same information part (copies of code blocks), reduced the use of ensembles of codes and ciphers, which ensure guaranteed reliability when performing the selection of undistorted characters (localization), complicating the processing of accurate calculation of outcome probabilities, covering the entire channel quality range in duplex and simplex modes x for optimal results.
- the task is to more effectively implement each type of protection, in comparison with the known means of protection, but with a new quality of providing guaranteed characteristics of the information system, such as guaranteed high reliability with an arbitrary nature of distortions (the probability of error in the information given to the consumer is 10 "9 , 10 "18 or less), bringing guaranteed messages according to any nonzero channel bandwidth by using the channel adaptation properties described probabilistic w distortion q-ary symbol, guaranteed protection resistance, and others.
- Information is transmitted over all types of channels with non-zero bandwidth with the provision of controlled in advance settable properties of the information transfer protocol.
- the quality analysis of the used communication channel or information storage medium is carried out by transmitting a block of a stochastic q-ary code with the repetition of (n, l, q), after receiving, perform a character-by-character comparison of the received q-ary characters and count the number of matching q-ary characters, determine the proportion matching characters with respect to the code length n, according to the value of the obtained fraction of undistorted q-ary characters, the code parameters are selected with integrity restoration for transmitting information in this channel.
- the selection of the optimal code parameters for duplex public channels is carried out according to the criterion of the maximum transmission speed while ensuring the required reliability required in advance, estimated by the probability of error in the information issued to the consumer.
- the selection of optimal code parameters for simplex channels is carried out according to the criterion of ensuring the required reliability of message delivery, estimated by the probability of message delivery from the first transmission, while ensuring the required reliability.
- the randomization of q-ary symbols of signals in a transmission is performed to convert the values of symbols into a random signal regardless of the transmitted information; at reception, to convert the error vector of a q-ary symbol, it is equally probable to any q-1 values of a q-ary symbol, except for the transmitted
- the randomization of q-ary symbols is performed using the operation described twice by the stochastic transition matrix, with the participation of the randomization parameter obtained from the source, regardless of the transmitted information.
- the reliability of the integrity of individual q-ary symbols is checked by checking the conditions M, (/ *)> ⁇ q (t *), where ⁇ q (t *) are the threshold values of the number of fulfilled relations for the q-ary symbol at a certain value of t *, characters for which the condition is not met are erased, and the value of N l decreases by the number of characters erased.
- Restoring information integrity is performed by correcting non-localized and erased characters, expressing the value of the corrected character through the values of reliable localized or previously corrected characters, for which a check ratio is selected, which includes one corrected character and the rest only reliably localized and previously corrected characters, the value of the corrected character obtained by summing modulo 2 values of reliable localized and previously corrected characters included in the selected roverochnoe ratio.
- the decoding of m copies of the (n, k, q) code is performed by localizing and accumulating correctly received characters in three stages, counting the total number of fulfilled relations and the number of fulfilled relations for each character, while pairwise comparing m of the same characters as for the q- block egg (m, l, q) code, matching characters accumulate as localized, localize correctly received characters for each of m blocks according to the decoding rules of (njc, q) code, characters localized in any block accumulate, for previously not Kalized characters are cross-localized with the substitution of the values of non-localized q-ary characters from different copies into the checked verification ratio, after the localization, the correct localization is checked, unreliable and non-localized characters are corrected, expressing their values through the values of authentically localized characters ..
- the authentication and restoration of information integrity is achieved using authentication stochastic q-ary (n, k, q, m) codes with randomization parameters received from a source with initial filling used as authentication keys.
- randomization stridelization
- a message file
- randomization parameter generated on an individual key of the corresponding user
- q-ary characters are randomized with a cipher ensemble replaced by each encryption block, while direct randomization (encrypting stochastic conversion) of a q-ary character ensures, regardless of the transmitted information, the quasi-random nature of the signal; inverse randomization (stochastic decoding transformation) of a q-ary symbol performs propagation of distortions in a q-ary symbol with equal probability for each of q-1 possible values of the symbol, except for the transmitted one.
- Protection against the imposition of false information in a channel with intentional interference is performed using an (n, k, q) code to restore integrity with a guaranteed probability of imposition of false information not exceeding q "1.
- Code blocks with unrepaired distortions are transmitted repeatedly by feedback signal .
- the method is carried out in the following sequence.
- the channel Prior to the transmission of information over a communication channel whose properties are not known, the channel is tested. Moreover, for any channel with non-zero bandwidth, the set of operations of the method is the same.
- n 100.
- n q- of different characters of the code is subjected to direct transmission, and to reverse randomization reception (stochastic transformation), which minimize the probability of accidental coincidence of 2 (3 or more) distorted characters.
- n 100
- the testing procedure will end successfully if 2 or more q-ary characters appear to be undistorted from 100 characters.
- the binary parameters of the code are equal (512 /, 502Z).
- each q-ary character is randomized with a randomization parameter ⁇ of length / from an independent sensor, on the receiving side, the inverse stochastic transformation of each q-ary symbol is performed with the participation of synchronously generated values ⁇ of length /, localization of correctly received q-ary symbols, count the number of localized characters, check the correctness of localization, exactly localized characters are erased, non-localized and erased characters are corrected, expressing the values of the corrected characters through the values of authentically localized characters.
- the formation of redundant symbols is performed alternately for the i-th q-ary character (i with [l, nk]) by modulo summing 2 of those information q-ary characters that correspond to character 1 in the i-th row of the binary check matrix H ( n, k) code.
- each q-ary character On the transmitting side (before being written to the memory), for each q-ary character, a combination of a randomization parameter of length / bit from a source independent of information is generated, then each q-ary character is randomized with a randomization parameter,
- a combination of a randomization parameter of length / is generated, synchronously with the transmitting side, reverse the randomization of each q-ary symbol with the participation of a randomization parameter.
- the integrity control of q-ary characters is performed by isolating (localizing) correctly received characters.
- the principle of multiple error detection in the part of the code block symbols is used when a combination of undistorted characters that are part of one of the test code relationships is found, then this relationship is satisfied, and the undistorted q-ary characters included in it are considered detected or localized.
- the verification of the correct localization of individual q-ary symbols is carried out by checking the conditions M 1 (/ *)> ⁇ q (t *), where ⁇ q (t *)
- Restoring the integrity of code blocks is performed by expressing the value of the corrected character through the values of authentically localized or previously corrected characters, for which a check ratio is selected, which includes one corrected character and the rest only reliably localized and previously corrected characters, the value of the corrected symbol is obtained by summing modulo 2 values of localized and previously corrected characters, them into the selected verification ratio.
- the optimality of the code used in the discrete channel is controlled, based on the ability to provide maximum transmission speed.
- the current control of the code optimality is based on the analysis of the number of blocks, as a result of decoding of which it was not possible to restore the integrity of the information (to completely correct errors due to exceeding the error rate of the correcting ability of the code).
- the most important randomization (stochastic transformation) operation is performed in any way to ensure the q-ary symmetric channel property, i.e. transforming the error vector in a q-ary symbol into one of its possible values with equal probability.
- the application of such an operation provides the guaranteed reliability of the information given to the consumer in an arbitrary channel.
- Randomization can be carried out using the randomization parameter from the generator with a constant initial filling set before the generator starts, as well as using the initial filling determined by the cryptographic key system (secret or public).
- the generation of values of the randomization parameter ⁇ of length / can be performed using any known technical solution.
- One implementation option may be a register-based generator with non-linear functions in feedback circuits based on tables with random filling (RF patent .Nb 2246129), when the initial filling of tables with random numbers and a shift register with feedback are a cryptographic protection key.
- Randomization can be a cryptographic operation, providing: on the transmitting side when transmitting any information, even the same information combinations in the code block, switching to random signals in the communication channel, ensuring absolute secrecy in Shannon’s production; on the receiving side, within each distorted q-ary character of length / bit, converting it with one of 2 1 - 1 random combinations (except for the transmitted) with equal probability, which ensures that the reliability guaranteed in an arbitrary channel is P 01n ⁇ q "1.
- any necessary reliability can be obtained (by choosing the value of I), including tending to zero.
- Protection from the imposition of false information under conditions of simultaneously solving problems of increasing the efficiency of information transfer for any quality of the channel, including a significant decrease in this quality and protection against destructive influences, is achieved through code recovery operations (direct code error correction) with guaranteed reliability of such a successful recovery for any type of interference. That is, if the number of distorted q-ary characters does not exceed the corrective ability of the code, then these distortions will be reliably corrected, if the number of distorted characters exceeds the corrective ability of the code, a reliable refusal will occur, but the distorted information will not be provided to the consumer of information.
- the upper and lower optimality thresholds selected during design have values of the order of 0.5 and 0.1, respectively.
- the considered method of transmitting and protecting information has, as analogues, a number of technical solutions related to error-correcting coding, means of authentication of messages and subscribers, means of ensuring the stability of the functioning of information and telecommunication systems.
- analogues a number of technical solutions related to error-correcting coding, means of authentication of messages and subscribers, means of ensuring the stability of the functioning of information and telecommunication systems.
- the application of the method provides, with guaranteed reliability, any arbitrarily set reliability of message delivery from the first transmission, including in a low-quality channel, where copy decoding mode can be used. Moreover, the mode of decoding copies provides the maximum possible corrective ability for the design of the extended code.
- ⁇ it is possible to reliably and accurately determine the quality of the channel used; ⁇ select the optimal code for any possible channel quality with a probability of distortion of a q-ary character from 0.5 to any small value of this probability (respectively, from a probability of distortion of a binary character from 0.1 to any small value, for example, up to 10 "7 ) any the law of distribution of the error stream; the unified character of the description of the properties of the channel on which it is possible to build adaptation operations, both when the data transmission channel is turned on and during its operation:
- the task is set to effectively implement each type of protection, in comparison with the known means of protection, but with a new quality of providing guaranteed characteristics of the information system, such as guaranteed high reliability with an arbitrary nature of distortions (the probability of error in the information given to the consumer is 10 "9 , 10 " 18 or less), bringing guaranteed messages according to any nonzero channel bandwidth by using the channel adaptation properties described probability claim zheniya q- ary symbol guaranteed protection resistance, and others.
- This method of error correction allows you to bring information on a channel of very low, almost arbitrary quality with a non-zero throughput.
- the method allows for information exchange on duplex and simplex channels, in all possible transmission conditions, including when it is impossible to use other methods (low channel quality, intentional interference), ensure the accuracy of the calculation of these characteristics due to the randomization of signals in and perform all the information protection functions in a complex with higher efficiency, in all possible conditions, within the framework of one information processing algorithm with a single introduction of redundancy
- the method can be applied in all cases where error-correcting codes are used with error detection or correction, cryptography methods, means of protection against imposing false information, access control to information in information systems, protection against destructive influences, monitoring and restoring the integrity of information in data arrays, moreover, both in cases where protection is built as complex (in tunneled protocols and special-purpose systems), and in cases where traditionally used separate from the tasks of integrated protection. That is, the method can be applied in: networks of the type IPT / IP; in networks using various protocol stacks; in radio networks and communication channels, including in broadband wireless networks such as Wi-Fi, Wi-Max; in broadcast systems to ensure noise immunity of the transmission with the expansion of the reach of the signal and control the use of the network by subscribers;
- Patent of the Russian Federation JCH ° 2254685 A method of encrypting information conversion.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Probability & Statistics with Applications (AREA)
- Theoretical Computer Science (AREA)
- Quality & Reliability (AREA)
- Detection And Prevention Of Errors In Transmission (AREA)
- Error Detection And Correction (AREA)
- Mobile Radio Communication Systems (AREA)
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200780053850.6A CN101779190B (zh) | 2007-08-30 | 2007-10-22 | 信息传输和综合保护的方法 |
JP2010522850A JP5193303B2 (ja) | 2007-08-30 | 2007-10-22 | 情報伝送及び複雑な保護の方法 |
US12/298,708 US8473738B2 (en) | 2007-08-30 | 2007-10-22 | Mode of information transmission and complex protection |
EP07872134.7A EP2192487A4 (de) | 2007-08-30 | 2007-10-22 | Informationsübertragung und integriertes schutzverfahren |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
RU2007132646/09A RU2367007C2 (ru) | 2007-08-30 | 2007-08-30 | Способ передачи и комплексной защиты информации |
RU2007132646 | 2007-08-30 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2009028982A1 true WO2009028982A1 (fr) | 2009-03-05 |
Family
ID=40387532
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/RU2007/000580 WO2009028982A1 (fr) | 2007-08-30 | 2007-10-22 | Dispositif de transmission et de protection intégrée d'informations |
Country Status (6)
Country | Link |
---|---|
US (1) | US8473738B2 (ru) |
EP (1) | EP2192487A4 (ru) |
JP (1) | JP5193303B2 (ru) |
CN (1) | CN101779190B (ru) |
RU (1) | RU2367007C2 (ru) |
WO (1) | WO2009028982A1 (ru) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107636995A (zh) * | 2015-03-15 | 2018-01-26 | 高通股份有限公司 | 用于突发干扰和打孔处理的mcs/pmi/ri选择和编码/交织机制 |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2960366A1 (fr) * | 2010-05-20 | 2011-11-25 | Ingenico Sa | Procede d’obtention de cles de chiffrement, terminal, serveur, et produits programmes d’ordinateurs correspondants |
US10728761B2 (en) * | 2010-11-29 | 2020-07-28 | Biocatch Ltd. | Method, device, and system of detecting a lie of a user who inputs data |
RU2517717C1 (ru) * | 2012-11-15 | 2014-05-27 | Ярослав Афанасьевич Хетагуров | Способ определения нарушений и исправления нарушенных кодов разрядов числа при кодировании "1 из 4" |
US10594687B2 (en) | 2013-05-14 | 2020-03-17 | Kara Partners Llc | Technologies for enhancing computer security |
US10057250B2 (en) * | 2013-05-14 | 2018-08-21 | Kara Partners Llc | Technologies for enhancing computer security |
CZ2013373A3 (cs) * | 2013-05-22 | 2014-12-03 | Anect A.S. | Způsob autentizace bezpečného datového kanálu |
KR102128471B1 (ko) | 2014-03-11 | 2020-06-30 | 삼성전자주식회사 | 폴라 부호의 리스트 복호 방법 및 이를 적용한 메모리 시스템 |
US9507581B2 (en) * | 2015-01-14 | 2016-11-29 | Dell Products Lp | Systems and methods of device firmware delivery for pre-boot updates |
US10719777B2 (en) | 2016-07-28 | 2020-07-21 | At&T Intellectual Propery I, L.P. | Optimization of multiple services via machine learning |
US9979450B2 (en) * | 2016-10-07 | 2018-05-22 | Qualcomm Incorporated | Adaptive codeword and codeblock selection in wireless communications |
CN109379306B (zh) | 2017-08-11 | 2021-10-15 | 中兴通讯股份有限公司 | 一种接收信号的处理方法及装置 |
CN107786331B (zh) * | 2017-09-28 | 2020-03-17 | 平安普惠企业管理有限公司 | 数据处理方法、装置、系统及计算机可读存储介质 |
US11935331B2 (en) * | 2021-03-04 | 2024-03-19 | The Bank Of New York Mellon | Methods and systems for real-time electronic verification of content with varying features in data-sparse computer environments |
US11581984B2 (en) * | 2021-05-07 | 2023-02-14 | Qualcomm Incorporated | Retransmission technique with compressed feedback in a wireless communication system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
RU94032780A (ru) * | 1994-09-08 | 1996-07-20 | Ивановский Инженерно-Строительный Институт | Способ передачи и приема дискретной информации |
US6044485A (en) * | 1997-01-03 | 2000-03-28 | Ericsson Inc. | Transmitter method and transmission system using adaptive coding based on channel characteristics |
RU2246129C2 (ru) | 2003-01-13 | 2005-02-10 | Осмоловский Станислав Антонович | Способ генерации случайных чисел |
RU2251814C1 (ru) * | 2003-08-18 | 2005-05-10 | Федеральное государственное унитарное предприятие "Калужский научно-исследовательский институт телемеханических устройств" | Способ передачи информации с использованием адаптивного помехоустойчивого кодирования |
RU2254685C2 (ru) | 2003-01-13 | 2005-06-20 | Осмоловский Станислав Антонович | Способ шифрующего преобразования информации |
RU2266622C1 (ru) | 2004-03-29 | 2005-12-20 | Осмоловский Станислав Антонович | Способ блочного шифрования информации |
RU2292122C1 (ru) * | 2005-05-11 | 2007-01-20 | Станислав Антонович Осмоловский | Способ комплексной защиты информации |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6381713B1 (en) * | 1999-05-11 | 2002-04-30 | Ericsson Inc. | Method for responding to transmission errors in a digital communication system according to characteristics of flawed information fields |
JP3843329B2 (ja) * | 2000-12-25 | 2006-11-08 | 株式会社日立国際電気 | 適応変調方式制御方法 |
JP2002246916A (ja) * | 2001-02-19 | 2002-08-30 | Ricoh Co Ltd | 誤訂正装置 |
JP3949937B2 (ja) * | 2001-11-12 | 2007-07-25 | 学校法人玉川学園 | 情報通信における対話方式の誤り訂正方法 |
JP4078848B2 (ja) * | 2002-02-26 | 2008-04-23 | Kddi株式会社 | 時空間ブロック符号を用いた適応符号化方法及び送信装置 |
JP4787167B2 (ja) * | 2003-12-01 | 2011-10-05 | デジタル ファウンテン, インコーポレイテッド | サブシンボル・ベース符号を使用する消去からのデータの保護 |
JP2006229693A (ja) * | 2005-02-18 | 2006-08-31 | Matsushita Electric Ind Co Ltd | 符号化装置、復号化装置、送信装置、受信装置および符号化方法 |
CN100346632C (zh) * | 2005-06-02 | 2007-10-31 | 复旦大学 | 一种抗几何变形的用于隐秘的传输图像的大容量通信方法 |
-
2007
- 2007-08-30 RU RU2007132646/09A patent/RU2367007C2/ru not_active IP Right Cessation
- 2007-10-22 CN CN200780053850.6A patent/CN101779190B/zh not_active Expired - Fee Related
- 2007-10-22 JP JP2010522850A patent/JP5193303B2/ja not_active Expired - Fee Related
- 2007-10-22 WO PCT/RU2007/000580 patent/WO2009028982A1/ru active Application Filing
- 2007-10-22 US US12/298,708 patent/US8473738B2/en not_active Expired - Fee Related
- 2007-10-22 EP EP07872134.7A patent/EP2192487A4/de not_active Withdrawn
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
RU94032780A (ru) * | 1994-09-08 | 1996-07-20 | Ивановский Инженерно-Строительный Институт | Способ передачи и приема дискретной информации |
US6044485A (en) * | 1997-01-03 | 2000-03-28 | Ericsson Inc. | Transmitter method and transmission system using adaptive coding based on channel characteristics |
RU2246129C2 (ru) | 2003-01-13 | 2005-02-10 | Осмоловский Станислав Антонович | Способ генерации случайных чисел |
RU2254685C2 (ru) | 2003-01-13 | 2005-06-20 | Осмоловский Станислав Антонович | Способ шифрующего преобразования информации |
RU2251814C1 (ru) * | 2003-08-18 | 2005-05-10 | Федеральное государственное унитарное предприятие "Калужский научно-исследовательский институт телемеханических устройств" | Способ передачи информации с использованием адаптивного помехоустойчивого кодирования |
RU2266622C1 (ru) | 2004-03-29 | 2005-12-20 | Осмоловский Станислав Антонович | Способ блочного шифрования информации |
RU2292122C1 (ru) * | 2005-05-11 | 2007-01-20 | Станислав Антонович Осмоловский | Способ комплексной защиты информации |
Non-Patent Citations (4)
Title |
---|
ROMANETS JU.W.; TIMOFEEW P.A.; SCHANGIN W.A.: "Schutz der Information in Computersystemen und Netzen", MOSKAU: RADIO I SWJAS, 1999 |
See also references of EP2192487A4 |
SIMA W.M.; MOLDOWJAN A.A.; MOLDOWJAN N.A., SICHERHEIT DER GLOBALEN NETZTECHNOLOGIEN., 2001 |
W.PETERSON; E.WELDON, ERROR-CORRECTING CODES, 1976 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107636995A (zh) * | 2015-03-15 | 2018-01-26 | 高通股份有限公司 | 用于突发干扰和打孔处理的mcs/pmi/ri选择和编码/交织机制 |
CN107636995B (zh) * | 2015-03-15 | 2020-07-14 | 高通股份有限公司 | 用于突发干扰和打孔处理的mcs/pmi/ri选择和编码/交织机制 |
Also Published As
Publication number | Publication date |
---|---|
RU2367007C2 (ru) | 2009-09-10 |
US8473738B2 (en) | 2013-06-25 |
CN101779190B (zh) | 2013-06-05 |
JP5193303B2 (ja) | 2013-05-08 |
US20100241859A1 (en) | 2010-09-23 |
EP2192487A1 (de) | 2010-06-02 |
JP2010538523A (ja) | 2010-12-09 |
CN101779190A (zh) | 2010-07-14 |
EP2192487A4 (de) | 2014-04-02 |
RU2007132646A (ru) | 2009-03-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
RU2367007C2 (ru) | Способ передачи и комплексной защиты информации | |
US5161244A (en) | Cryptographic system based on information difference | |
EP1715615B1 (en) | Quantum key delivering method and communication device | |
US7461323B2 (en) | Quantum key delivery method and communication device | |
CN106027230B (zh) | 一种在量子密钥分发后的处理中进行误码纠错的方法 | |
US9496897B1 (en) | Methods and apparatus for generating authenticated error correcting codes | |
EP1715614A1 (en) | Quantum key delivering method and communication device | |
Kuznetsov et al. | Code-based electronic digital signature | |
CN101710852A (zh) | 具有加密功能的ldpc码编/解码方法和编/解码器 | |
RU2295199C1 (ru) | Способ формирования ключа шифрования/дешифрования | |
US7260222B2 (en) | Shared data refining device and shared data refining method | |
Mihaljević et al. | An approach for stream ciphers design based on joint computing over random and secret data | |
Wang et al. | Communication with partial noisy feedback | |
RU2292122C9 (ru) | Способ комплексной защиты информации | |
RU2319199C2 (ru) | Универсальный способ передачи информации с контролируемыми параметрами | |
US9705675B2 (en) | Method and system making it possible to test a cryptographic integrity of an error tolerant data item | |
Moldovyan et al. | Symmetric encryption for error correction | |
Nikov et al. | On a relation between verifiable secret sharing schemes and a class of error-correcting codes | |
RU2183051C2 (ru) | Способ формирования ключа шифрования/дешифрования | |
Mihaljević | A Framework for Stream Ciphers Based on Pseudorandomness, Randomness and Coding | |
RU2356168C2 (ru) | Способ формирования ключа шифрования/дешифрования | |
RU2264647C1 (ru) | Способ адаптивной передачи информации | |
Harrison et al. | Tandem coding and cryptography on wiretap channels: EXIT chart analysis | |
RU2180469C2 (ru) | Способ формирования ключа шифрования/дешифрования | |
Ryabko | Linear hash-functions and their applications to error detection and correction |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200780053850.6 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07872134 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2413/MUMNP/2009 Country of ref document: IN |
|
ENP | Entry into the national phase |
Ref document number: 2010522850 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007872134 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 12298708 Country of ref document: US |